Security Investigate

Secure the Clones

Download now Free registration required

Executive Summary

Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to an internal mutable object. However, implementation of a copy method (like clone ()) is entirely left to the programmer. It may not provide a sufficiently deep copy of an object and is subject to overriding by a malicious sub-class. Currently no language-based mechanism supports secure object cloning. This paper proposes a type-based annotation system for de ning modular copy policies for class-based object-oriented programs. A copy policy speci es the maximally allowed sharing between an object and its clone.

  • Format: PDF
  • Size: 923.3 KB